Browsing author

root

RCE Vulnerability Fully Compromises Deutsche Telekom Server

Attackers could have had full control over DT’s Web server. Independent Egyptian security researcher Ebrahim Hegazy has found another vulnerability, and this one affected the Web servers of Deutsche Telekom, Germany’s biggest telecommunications provider. Hegazy discovered the bug on the telekom.de website, on one of the subdomains that displayed a generic landing page. The subdomain umfragen.telekom.de […]

Yes, You Are Now Allowed To Hack Your WiFi Router

Short Bytes: After facing tons of criticism over the new proposed rules governing the 5GHz spectrum devices (basically your WiFi routers), the FCC has decides to remove the controversial wordings from the proposal. The FCC has modified the proposal and cleaned the air, telling that it allows the use of open source firmware.  Some months […]

PNG pongs: critical bug patched in ubiquitous libpng

Crafted image crashes apps, server processes. This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched. The problem for that is that libpng is everywhere – in browsers, anything that processes photos to produce thumbnails, file browsers, music players, in applications in every operating system. The bug […]

Anonymous Announces Payback for ISIS Paris Attacks

It didn’t take long for Anonymous members to rally and swear payback for the recent ISIS terror attacks that took place in Paris, France, on Friday, November 13, 2015. Having run #OpISIS back at the beginning of the year, after the Charlie Hebdo massacre in January, various smaller branches of the Anonymous hacktivism group are […]

Security Flaw in Samsung Galaxy Devices Lets Attackers Record Phone Calls

A telephone tower-like device (IMSI-catcher) can be used for recording phone calls from the latest versions of Samsung Galaxy, demonstrated by two German researchers. IMSI-catchers are mostly used in laboratories for testing purposes, but they can be bought by anyone who wishes to have one. So, what happens is anyone having these catchers can mimic […]

Anonymous Announces Revenge Campaign For Paris Attacks By ISIS #OpParis

Short Bytes: In response to the Paris attacks, Hacktivist group Anonymous was quick to issue a warning to its long-time foe ISIS. The group has released two videos that warn ISIS and ask them to “expect a total mobilization on their part.” In the past, hacktivist group Anonymous has shown its commitment to crush ISIS […]

Facebook blocked anti-ISIS group setup by Anonymous hours before Paris attacks.

Just hours before the Paris attacks, Facebook blocked a group “Report ISIS accounts” that was made by anonymous members for unmasking ISIS group members on Facebook. The Facebook group was started by the Anonymous group “Red Cult” and was part of the operation which was termed as #OpISIS by the Anonymous group. Social media has been the main weapon […]

Java Makes a Comeback, One in Every Five Lines of Code Is Now Written in Java

Short Bytes: The popularity of programming languages is measured using various factors. The TIOBE index is often used as the best way to learn about the popularity of a programming language and the latest trend indicates that Java is once again rising to claim the top spot. According to the latest report of TIOBE, released […]

Samsung Galaxy S6 Edge Saves Guy’s Life During Paris Terror Attacks

Smartphones have taken our lives to a different level, besides helping us to connect with others, they also save lives; just like this one in yesterday’s attack in Paris. Advancement in technology has given a new shape to lives. Almost each and every person is carrying smartphones these days and these phones not only help […]

Brazilian Army Gets Hacked Following Cyber-Games Cheating Accusations

Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked the personal details of around 7,000 officers. The attack was carried out after the Brazilian Army’s team was accused of cheating in a series of cyber-security games. The game in question is CTF […]

PoS Malware Spread via Weaponized Microsoft Word Documents

Distributed via Word files and the Angler EK. Cyber-crooks are diversifying their activities by including as many threats as possible inside their malware-delivery campaigns. One such example is a campaign detected by Proofpoint, which saw a new type of PoS (Point of Sale) malware bundled with the Vawtrack banking trojan. This new PoS malware was named […]

Researchers Discover Two New Strains of POS Malware

Point of sale malware has gotten more sophisticated as we inch closer to the two-year anniversary of the Target data breach. Now, two weeks from the biggest shopping day of the year, two new and different strains of point of sale malware have come to light, including one that’s gone largely undetected for the past […]

Did Russian Hackers Breach Spotify Accounts?

Newsweek has revealed that Spotify (One of the giants of the Music industry) faced a hacking attack last week and thousands of email ids and passwords were leaked by hackers. Newsweek interacted within 9 of the users whose accounts were leaked and posted publicly on 2nd November. Out of those 9 users, a user claimed […]

Jail Time for US Citizen Who Posted Pro-ISIS GIF Image

The US government has started arresting people who are showing support for the so-called Islamic State (IS, previously ISIS/ISIL) on social media. Whether it be a Facebook status, tweet or even GIFs. If you are found showing support to the group, you could be put behind bars. Recently, a 25-year-old Akron posted a GIF showing photographs and names […]

Oil and Gas Companies Indirectly Put at Risk by Vulnerabilities in ERP Systems

Vulnerabilities in SAP and Oracle products expose companies to crippling attacks, oil market fraud or equipment sabotage. A talk delivered at the Black Hat Europe 2015 security conference in Amsterdam shows how one simple vulnerability in an ERP suite used inside oil and gas companies can escalate to grant attackers access to the company’s entire infrastructure. […]

7 things you need to know about car hacking

Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.